Abstract
Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Mobile network is the shared media. When media are shared, privacy and authentication are lost unless some method is established to regain it. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP, bringing out the commonality between A5/3 and GEA3 algorithms. The following paper is based on simulation of A5/1, A5/3 and f8 algorithms.
An Erratum for this chapter can be found at http://dx.doi.org/10.1007/978-3-642-22543-7_76
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pandya, R.: Mobile and Personal Communication Systems and Service’s. IEEE Press, New York (2001)
Schneier, B.: Applied Cryptography. John Wiley & Sons Inc., New York (1996)
Feher, K.: Wireless Digital Communication - Modulation and Spread Spectrum Applications. Prentice Hall of India Private Ltd., New Delhi (2000)
Garg, V.K.: Wireless and Personal Communication System. Prentice Hall of India Private Ltd., New Delhi (1997)
Stallings, W.: Cryptography and Network Security. Prentice Hall, New Jersey (2006)
Haykin, S.: Communication System. In: 2001 Library of Congress in publication Cataloging Data, Singapore (2001)
Uylessblock: Wireless and personal communications system. PHI, New Delhi (2000)
Veni Madhavan, C.E., Saxena, P.K.: Recent Trends in Applied Cryptology. IETE Technical Review 20(2) (March-April 2003)
Briceno, M., Goldberg, I., Wagner, D.: A Pedagogical Implementation of the A5/1 (1999)
Technical specification of 3GPP TS 55.216 V6.2.0 (2003-2009)
Biham, E., Dunkelmna, O.: Cryptanalysis of the A5/1GSM stream Cipher (2000)
Anderson, R., Roe, M.: A5-The GSM Encryption Algorithm (1994)
Pitz, S., Schmitz, R., Martin, T.: Security mechanism in UMTS. Datenschutz and Datensicherheit (DUD) 25, 1–10 (2001)
Wei, L., Zibin, D., Longmei, N.: Research and Implementation of a High speed Reconfigurable A5 Algorithm. IEEE, Los Alamitos (2008)
Huang, X., Shah, P.G., Sharma, D.: Protecting from Attacking the man-in-middle in wireless sensor Network with elliptic curve cryptography key exchange. In: 2010 Fourth International Conference on Network and System Security (2010)
Ahmed, F., Imran, M.: Cryptographic Analysis of GSM Network. IEEE, Los Alamitos (2009)
Ahmad, M., Izharuddin: Enhanced A5/1 Cipher with improved linear Complexity. IEEE, Los Alamitos (2009)
Pitz, S., Schmitz, R., Martin, T.: Security mechanism in UMTS. Datenschutz and Datensicherheit (DUD) 25, 1–10 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sankaliya, A.R., Mishra, V., Mandloi, A. (2011). Retracted: Secure Conversation Using Cryptographic Algorithms in 3G Mobile Communication. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Trends in Network and Communications. WeST NeCoM WiMoN 2011 2011 2011. Communications in Computer and Information Science, vol 197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22543-7_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-22543-7_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22542-0
Online ISBN: 978-3-642-22543-7
eBook Packages: Computer ScienceComputer Science (R0)